Sciweavers

1165 search results - page 22 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
GLOBECOM
2009
IEEE
15 years 6 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
15 years 1 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
ICN
2005
Springer
15 years 5 months ago
Reliable Mobile Ad Hoc P2P Data Sharing
Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method f...
Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Se...
WISTP
2009
Springer
15 years 6 months ago
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
Olivier Heen, Gilles Guette, Thomas Genet
ICCCN
2007
IEEE
15 years 6 months ago
A Bio-Inspired Robust Routing Protocol for Mobile Ad Hoc Networks
—In this paper we discuss robustness issues of a biologically inspired routing protocol for mobile ad hoc networks and the influence it has on the Quality of Service (QoS) in th...
Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata